• Like
What makes the IT industry tick?
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

What makes the IT industry tick?

  • 1,498 views
Published

Keynote presentation at ISACA ISRM in Vegas 9-19-2011. How emerging threats are changing the face of IT security.

Keynote presentation at ISACA ISRM in Vegas 9-19-2011. How emerging threats are changing the face of IT security.

Published in Technology , Business
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
1,498
On SlideShare
0
From Embeds
0
Number of Embeds
1

Actions

Shares
Downloads
30
Comments
0
Likes
0

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n

Transcript

  • 1. What Makes the IT SecurityIndustry Tick?ISACA ISRM Las Vegas September 19, 2011Richard Stiennon, Chief Research Analyst, IT-Harvest
  • 2. The IT-Security Industry 1,200 vendors 540 in the United States 230 in the Bay Area
  • 3. What drives the industry?Threats Cyber war Severity Cyber crime Hacktivism Defacement Exploratory hacking Time
  • 4. Where does GRC fit in?New threat 2 years New technology 4-10 years New compliance regime 6 mo.- 2 years New audit practice
  • 5. 80 Security Product Categories
  • 6. De-coupling: keep it simple A secure network assumes the host is hostile A secure host assumes the network is hostile A secure application assumes the user is hostile
  • 7. The major segments Network IAM Gateways End point Data Protection Protection Services
  • 8. Gateway security: NGFW = UTM
  • 9. Three new features ingateways Application awareness Identity based policies Beaconing detection
  • 10. Beaconing Detection
  • 11. End point protection Signatures are getting out of control 35,000 new malware every day Average malware infects 5 devices Mobile platforms Zero days side step all protection
  • 12. White listing has come of age Deny all but that which is explicitly allowed. False positives minimized by learning systems Metrics provided by adding back in signature based detection
  • 13. What’s new in encryption?Key discovery, Identity based encryptioncertificatemanagement Source: Yaron Wikipedia
  • 14. Identity and accessmanagement (IAM)Mobile authentication on a rapid rise
  • 15. SAAS - cloud basedservices
  • 16. Where is cyber conflicttaking the industry?
  • 17. Take awaysSecurity industry is NOT consolidatingCompliance is NOT securityCybercrime is NOT larger than illegal drug trade